Skip to main content

A Risk-Aware Resource Service Decision Strategy for Global Computing

  • Conference paper
Autonomic and Trusted Computing (ATC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6407))

Included in the following conference series:

  • 574 Accesses

Abstract

In an unreliable environment such as global computing, resource providers are faced with the problem of making decision autonomously with partial information before providing services for resource requesters. Although many trust management models have been proposed to deal with security concerned in resource service, few of them take risk into consideration. In those schemes involving risk, either risk is discussed conceptually, or methods for calculating risk and trustworthiness are not described clearly. This paper presents a risk-aware resource service decision strategy for global computing. The paper not only explores the pivotal source of risk and the relationship between trust and risk, but also quantifies risk to facilitate the resource service decision. The paper proposes the reputation inference based on probability theory and risk degree algorithm based on Chernoff Bound theorem. In the simulation, the performance of our risk-aware resource service decision strategy is evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Global Computing Initiative, http://cordis.europa.eu/ist/fet/gc.htm

  2. Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. English, C., Terzis, S., Wagealla, W.: Engineering Trust Based Collaborations in a Global Computing Environment. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 120–134. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Press, New York (1996)

    Google Scholar 

  5. Povey, D.: Developing Electronic Trust Policies Using a Risk Management Model. In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol. 1740, pp. 1–16. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  6. McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report, MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Research Center (1996)

    Google Scholar 

  7. Dimitrakos, T.: A Service-oriented Trust Management Framework. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 53–72. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Grandison, T., Sloman, M.: A Survey of Trust in Internet Application. IEEE Communication Survey 3, 2–16 (2000)

    Article  Google Scholar 

  9. Grandison, T., Sloman, M.: Specifying and Analyzing Trust for Internet Application. In: 2nd IFIP Conference on Towards the Knowledge Society: E-Commerce, E-Business, E-Government, pp. 145–157. Kluwer, Deventer (2002)

    Google Scholar 

  10. Jøsang, A., Presti, L.S.: Analysing the Relationship Between Risk and Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 135–145. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Manchala, D.W.: Trust Metrics, Models and Protocols for Electronic Commerce Transactions. In: 18th International Conference on Distributed Computing Systems, pp. 312–321. IEEE Press, New York (1998)

    Google Scholar 

  12. Solhaug, B., Elgesem, D., Stølen, K.: Why Trust is Not Proportional to Risk. In: 2nd International Conference on Availability, Reliability and Security, pp. 11–18. IEEE Press, New York (2007)

    Google Scholar 

  13. Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Risk Models for Trust-based Access Control (TBAC). In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 1–8. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Hirshleifer, J., Riley, J.: The Analytics of Uncertainty and Information, Cambridge surveys of economic literature. Cambridge University Press, Cambridge (1992)

    Book  Google Scholar 

  15. Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: 35th Hawail International Conference on System and Sciences, pp. 188–196. IEEE Press, New York (2005)

    Google Scholar 

  16. Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From Trust to Dependability through Risk Analysis. In: 2nd International Conference on Availability, Reliability and Security, pp. 19–26. IEEE Press, New York (2007)

    Chapter  Google Scholar 

  17. Jøsang, A., AlFayyadh, B., Grandison, T., AlZomai, M., McNamara, J.: Security Usability Principles for Vulnerability Analysis and Risk Assessment. In: 23rd Annual Computer Security Application Conference, pp. 269–278. IEEE Press, New York (2007)

    Google Scholar 

  18. Kim, D.J., Ferrin, D.L., Rao, H.R.: A Trust-based Consumer Decision Making Model in Electronic Commerce: The Role of Trust, Perceived risk, and Their Antecedents. Decision Support Systems 44, 544–564 (2008)

    Article  Google Scholar 

  19. Ryutov, T.: A Socio-cognitive Approach to Modeling Policies in Open Environments. In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 29–38. IEEE Press, New York (2007)

    Chapter  Google Scholar 

  20. Liang, Z.Q., Shi, W.S.: Analysis of Rating on Trust Inference in Open Environments. Performance Evaluation 65, 99–128 (2008)

    Article  Google Scholar 

  21. Liang, Z.Q., Shi, W.S.: PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. In: 38th Hawail International Conference on System and Sciences, pp. 201.2. IEEE Press, New York (2005)

    Google Scholar 

  22. Dudewicz, E.J., Mishra, S.: Modern Mathematical Statistics. John Wiley & Sons, New York (1988)

    MATH  Google Scholar 

  23. Heckerman, D.: A Tutorial on Learning with Bayesian Networks, Learning in Graphical Models. MIT Press, Cambridge (1999)

    MATH  Google Scholar 

  24. Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., Halberstadt, A.: Bayesian Rating in Distributed Systems: theories, models and simulations. MIT LCS Memorandum (2001)

    Google Scholar 

  25. Ross, S.: Stochastic Process. John Wiley & Sons, New York (1995)

    Google Scholar 

  26. Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using Trust and Risk in Role-based Access Control Policies. In: 9th ACM Symposium on Access Control Models and Technologies, pp. 156–162. ACM, New York (2004)

    Google Scholar 

  27. JAVASIM, http://javasim.codehaus.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Du, W., Cui, G., Liu, W. (2010). A Risk-Aware Resource Service Decision Strategy for Global Computing. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16576-4_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16575-7

  • Online ISBN: 978-3-642-16576-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics